Claim Name,Claim Description,JWT Claim Name,Claim Key,Claim Value Type,Change Controller,Reference
Reserved for Private Use,,,less than -65536,,,[RFC8392]
Unassigned,,,-65536 to -262,,,
globalplatform_component,"This claim holds an array of CBOR maps in which each array entry holds a map containing claims
about a GlobalPlatform component that is within the boundary of the enclosing Entity Attestation Token.",N/A,-261,map,[GlobalPlatform_Inc.],"[GlobalPlatform Entity Attestation Protocol Specification, GPP_SPE_001, Section 6.5.]"
hcert,Health Certificate,hcert,-260,map,[European_eHealth_Network],[Electronic Health Certificate Specification]
EUPHNonce,Challenge Nonce,EUPHNonce,-259,bstr,[FIDO_Alliance],[FIDO Device Onboard Specification]
EATMAROEPrefix,Signing prefix for multi-app restricted operating environments,EATMAROEPrefix,-258,bstr,[FIDO_Alliance],[FIDO Device Onboard Specification]
EAT-FDO,EAT-FDO may contain related to FIDO Device Onboarding,EAT-FDO,-257,array,[FIDO_Alliance],[FIDO Device Onboard Specification]
Unassigned,,,-256 to -1,,,
Reserved,This registration reserves the key value 0,,0,,[IESG],[RFC8392]
iss,Issuer,iss,1,text string,[IESG],[RFC8392]
sub,Subject,sub,2,text string,[IESG],[RFC8392]
aud,Audience,aud,3,text string,[IESG],[RFC8392]
exp,Expiration Time,exp,4,integer or floating-point number,[IESG],[RFC8392]
nbf,Not Before,nbf,5,integer or floating-point number,[IESG],[RFC8392]
iat,Issued At,iat,6,integer or floating-point number,[IESG],[RFC8392]
cti,CWT ID,jti,7,byte string,[IESG],[RFC8392]
cnf,Confirmation,cnf,8,map,[IESG],[RFC8747]
scope,"The scope of an access token, as defined in [RFC6749].",scope,9,byte string or text string,[IESG],"[RFC8693, Section 4.2]"
Nonce,Nonce,eat_nonce,10,bstr or array,[IETF],[RFC9711]
Unassigned,,,11 to 37,,,
ace_profile,"The ACE profile a token is supposed to be used
with.",ace_profile,38,integer,[IETF],"[RFC9200, Section 5.10]"
cnonce,"The client-nonce sent to the AS by the RS via
the client.",cnonce,39,byte string,[IETF],"[RFC9200, Section 5.10]"
exi,"The expiration time of a token measured from
when it was received at the RS in seconds.",exi,40,unsigned integer,[IETF],"[RFC9200, Section 5.10.3]"
Unassigned,,,41 to 168,,,
identity-data,"Registering the claim for storing identity data of a person, which could be personally identifiable data (PII) mostly used in Foundational/National ID for cross-border interoperability.",identity-data,169,map,[MOSIP],"[CBOR Identity Data in QR Code, Section 3][CBOR Identity Data in QR Code, Section 4]"
Unassigned,,,170 to 255,,,
UEID,Universal Entity ID,ueid,256,bstr,[IETF],[RFC9711]
SUEIDs,Semipermanent UEIDs,sueids,257,map,[IETF],[RFC9711]
Hardware OEM ID,Hardware OEM ID,oemid,258,bstr or int,[IETF],[RFC9711]
Hardware Model,Model identifier for hardware,hwmodel,259,bstr,[IETF],[RFC9711]
Hardware Version,Hardware Version Identifier,hwversion,260,array,[IETF],[RFC9711]
Uptime,Uptime,uptime,261,uint,[IETF],[RFC9711]
OEM Authorized Boot,Indicates whether the software booted was OEM authorized,oemboot,262,bool,[IETF],[RFC9711]
Debug Status,The status of debug facilities,dbgstat,263,uint,[IETF],[RFC9711]
Location,The geographic location,location,264,map,[IETF],[RFC9711]
EAT Profile,The EAT profile followed,eat_profile,265,uri or oid,[IETF],[RFC9711]
Submodules Section,The section containing submodules,submods,266,map,[IETF],[RFC9711]
Boot Count,The number of times the entity or submodule has been booted,bootcount,267,uint,[IETF],[RFC9711]
Boot Seed,Identifies a boot cycle,bootseed,268,bstr,[IETF],[RFC9711]
DLOAs,Certifications received as Digital Letters of Approval,dloas,269,array,[IETF],[RFC9711]
Software Name,The name of the software running in the entity,swname,270,tstr,[IETF],[RFC9711]
Software Version,The version of software running in the entity,swversion,271,array,[IETF],[RFC9711]
Software Manifests,Manifests describing the software installed on the entity,manifests,272,array,[IETF],[RFC9711]
Measurements,"Measurements of the software, memory configuration, and such on the entity",measurements,273,array,[IETF],[RFC9711]
Software Measurement Results,The results of comparing software measurements to reference values,measres,274,array,[IETF],[RFC9711]
Intended Use,The intended use of the EAT,intuse,275,uint,[IETF],[RFC9711]
Unassigned,,,276 to 281,,,
geohash,Geohash String,geohash,282,text string or array,[CTA],[Fast and Readable Geographical Hashing (CTA-5009)]
Unassigned,,,283 to 299,,,
wmver,The version of the WM Token,wmver,300,unsigned integer,[DASH-IF],[ETSI TS 104 002 V1.1.1]
wmvnd,The WM technology vendor,wmvnd,301,unsigned integer,[DASH-IF],[ETSI TS 104 002 V1.1.1]
wmpatlen,The length in bits of the WM pattern,wmpatlen,302,unsigned integer,[DASH-IF],[ETSI TS 104 002 V1.1.1]
wmsegduration,The nominal duration of a segment,wmsegduration,303,map,[DASH-IF],[ETSI TS 104 002 V1.1.1]
wmpattern,The WM pattern,wmpattern,304,COSE_Encrypt0 or COSE_Encrypt or byte string,[DASH-IF],[ETSI TS 104 002 V1.1.1]
wmid,Used as input to derive the WM pattern for indirect mode,wmid,305,text string,[DASH-IF],[ETSI TS 104 002 V1.1.1]
wmopid,Used as additional input to derive the WM pattern for indirect mode,wmopid,306,unsigned integer,[DASH-IF],[ETSI TS 104 002 V1.1.1]
wmkeyver,The key to use for derivation of the WM pattern in indirect mode,wmkeyver,307,unsigned integer,[DASH-IF],[ETSI TS 104 002 V1.1.1]
catreplay,Common Access Token Replay,N/A,308,unsigned integer,[CTA],[CTA-5007]
catpor,Common Access Token Probability of Rejection,N/A,309,array,[CTA],[CTA-5007]
catv,Common Access Token Version,N/A,310,unsigned integer,[CTA],[CTA-5007]
catnip,Common Access Token Network IP,N/A,311,array,[CTA],[CTA-5007]
catu,Common Access Token URI,N/A,312,map,[CTA],[CTA-5007]
catm,Common Access Token Method,N/A,313,array,[CTA],[CTA-5007]
catalpn,Common Access Token ALPN,N/A,314,array,[CTA],[CTA-5007]
cath,Common Access Token Header,N/A,315,map,[CTA],[CTA-5007]
catgeoiso3166,Common Access Token Geographic ISO3166,N/A,316,array,[CTA],[CTA-5007]
catgeocoord,Common Access Token Geographic Coordinate,N/A,317,array,[CTA],[CTA-5007]
catgeoalt,Common Access Token Geographic Altitude,N/A,318,array,[CTA],[CTA-5007]
cattpk,Common Access Token TLS Public Key,N/A,319,byte string,[CTA],[CTA-5007]
catifdata,Common Access Token If Data,N/A,320,string or array,[CTA],[CTA-5007]
catdpop,Common Access Token DPoP Settings,N/A,321,map,[CTA],[CTA-5007]
catif,Common Access Token If,N/A,322,map,[CTA],[CTA-5007]
catr,Common Access Token Renewal,N/A,323,map,[CTA],[CTA-5007]
Unassigned,,,324 to 2393,,,
psa-client-id,PSA Client ID,N/A,2394,signed integer,[Hannes_Tschofenig],"[RFC9783, Section 4.1.2]"
psa-security-lifecycle,PSA Security Lifecycle,N/A,2395,unsigned integer,[Hannes_Tschofenig],"[RFC9783, Section 4.3.1]"
psa-implementation-id,PSA Implementation ID,N/A,2396,byte string,[Hannes_Tschofenig],"[RFC9783, Section 4.2.2]"
Unassigned,,,,2397,,
psa-certification-reference,PSA Certification Reference,N/A,2398,text string,[Hannes_Tschofenig],"[RFC9783, Section 4.2.3]"
psa-software-components,PSA Software Components,N/A,2399,array,[Hannes_Tschofenig],"[RFC9783, Section 4.4.1]"
psa-verification-service-indicator,PSA Verification Service Indicator,N/A,2400,text string,[Hannes_Tschofenig],"[RFC9783, Section 4.5.1]"
Unassigned,,,2401 to 65535,,,
Presently we were in a very dark road, and at a point where it dropped suddenly between steep sides we halted in black shadow. A gleam of pale sand, a whisper of deep flowing waters, and a farther glimmer of more sands beyond them challenged our advance. We had come to a "grapevine ferry." The scow was on the other side, the water too shoal for the horses to swim, and the bottom, most likely, quicksand. Out of the blackness of the opposite shore came a soft, high-pitched, quavering, long-drawn, smothered moan of woe, the call of that snivelling little sinner the screech-owl. Ferry murmured to me to answer it and I sent the same faint horror-stricken tremolo back. Again it came to us, from not farther than one might toss his cap, and I followed Ferry down to the water's edge. The grapevine guy swayed at our side, we heard the scow slide from the sands, and in a few moments, moved by two videttes, it touched our shore. Soon we were across, the two videttes riding with us, and beyond a sharp rise, in an old opening made by the swoop of a hurricane, we entered the silent unlighted bivouac of Ferry's scouts. Ferry got down and sat on the earth talking with Quinn, while the sergeants quietly roused the sleepers to horse. Plotinus is driven by this perplexity to reconsider the whole theory of Matter.477 He takes Aristotle¡¯s doctrine as the groundwork of his investigation. According to this, all existence is divided into Matter and Form. What we know of things¡ªin other words, the sum of their differential characteristics¡ªis their Form. Take away this, and the unknowable residuum is their Matter. Again, Matter is the vague indeterminate something out of which particular Forms are developed. The two are related as Possibility to Actuality, as the more generic to the more specific substance through every grade of classification and composition. Thus there are two Matters, the one sensible and the other intelligible. The former constitutes the common substratum of bodies, the other the common element of ideas.478 The general distinction between Matter and Form was originally suggested to Aristotle by Plato¡¯s remarks on the same subject; but he differs325 from his master in two important particulars. Plato, in his Timaeus, seems to identify Matter with space.479 So far, it is a much more positive conception than the ?λη of the Metaphysics. On the other hand, he constantly opposes it to reality as something non-existent; and he at least implies that it is opposed to absolute good as a principle of absolute evil.480 Thus while the Aristotelian world is formed by the development of Power into Actuality, the Platonic world is composed by the union of Being and not-Being, of the Same and the Different, of the One and the Many, of the Limit and the Unlimited, of Good and Evil, in varying proportions with each other. The Lawton woman had heard of an officer's family at Grant, which was in need of a cook, and had gone there. [See larger version] On the 8th of July an extraordinary Privy Council was summoned. All the members, of whatever party, were desired to attend, and many were the speculations as to the object of their meeting. The general notion was that it involved the continuing or the ending of the war. It turned out to be for the announcement of the king's intended marriage. The lady selected was Charlotte, the second sister of the Duke of Mecklenburg-Strelitz. Apart from the narrowness of her education, the young princess had a considerable amount of amiability, good sense, and domestic taste. These she shared with her intended husband, and whilst they made the royal couple always retiring, at the same time they caused them to give, during their lives, a moral air to their court. On the 8th of September Charlotte arrived at St. James's, and that afternoon the marriage took place, the ceremony being performed by the Archbishop of Canterbury. On the 22nd the coronation took place with the greatest splendour. Mother and girls were inconsolable, for each had something that they were sure "Si would like," and would "do him good," but they knew Josiah Klegg, Sr., well enough to understand what was the condition when he had once made up his mind. CHAPTER V. THE YOUNG RECRUITS Si proceeded to deftly construct a litter out of the two guns, with some sticks that he cut with a knife, and bound with pawpaw strips. His voice had sunk very low, almost to sweetness. A soft flurry of pink went over her face, and her eyelids drooped. Then suddenly she braced herself, pulled herself taut, grew combative again, though her voice shook. HoME²Ô¾®Ïè̫ʲôÐÇ×ù
ENTER NUMBET 0016www.hnjnsbm.org.cn
www.felqng.com.cn
jxwsfjt.org.cn
hbcakl.com.cn
ketodr.com.cn
www.edssss.com.cn
www.frchain.com.cn
www.silk-ev.com.cn
www.rbchain.com.cn
srchain.com.cn